{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:52:11Z","timestamp":1773931931172,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T00:00:00Z","timestamp":1740441600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T00:00:00Z","timestamp":1740441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10586-024-04874-w","type":"journal-article","created":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T01:22:21Z","timestamp":1740446541000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Optimizing XGBoost hyperparameters using the dragonfly algorithm for enhanced cyber attack detection in the internet of healthcare things (IoHT)"],"prefix":"10.1007","volume":"28","author":[{"family":"Surbhi","sequence":"first","affiliation":[]},{"given":"Nupa Ram","family":"Chauhan","sequence":"additional","affiliation":[]},{"given":"Neeraj","family":"Dahiya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,25]]},"reference":[{"key":"4874_CR1","doi-asserted-by":"publisher","unstructured":"Waqas, M., Alyas, T., Ajmal, M. M., Khan, F., Whangbo, T., Mahmood, N.: Evaluation of smart city healthcare features (SCHF) through machine learning. 2022 International Conference on Business Analytics for Technology and Security, ICBATS (2022). https:\/\/doi.org\/10.1109\/ICBATS54253.2022.9759060","DOI":"10.1109\/ICBATS54253.2022.9759060"},{"key":"4874_CR2","doi-asserted-by":"publisher","DOI":"10.1109\/icter58063.2022.10024090","author":"I Dissanayake","year":"2023","unstructured":"Dissanayake, I., Weerasinghe, H.D., Welhenge, A.: A generation of dataset towards an anomaly-based intrusion detection system to detect denial of sleep attacks in internet of things (IoT). ICTer (2023). https:\/\/doi.org\/10.1109\/icter58063.2022.10024090","journal-title":"ICTer"},{"key":"4874_CR3","doi-asserted-by":"publisher","first-page":"200189","DOI":"10.1016\/j.iswa.2023.200189","volume":"17","author":"N Prazeres","year":"2023","unstructured":"Prazeres, N., Costa, RLd.C., Santos, L., Rabad\u00e3o, C.: Engineering the application of machine learning in an IDS based on IoT traffic flow. Intell. Syst. Appl. 17, 200189 (2023). https:\/\/doi.org\/10.1016\/j.iswa.2023.200189","journal-title":"Intell. Syst. Appl."},{"key":"4874_CR4","doi-asserted-by":"publisher","first-page":"100641","DOI":"10.1016\/j.measen.2022.100641","volume":"25","author":"B Madhu","year":"2023","unstructured":"Madhu, B., Chari, M.V.G., Vankdothu, R., Silivery, A.K., Aerranagula, V.: Intrusion detection models for IOT networks via deep learning approaches. Measurement Sens. 25, 100641 (2023). https:\/\/doi.org\/10.1016\/j.measen.2022.100641","journal-title":"Measurement Sens."},{"key":"4874_CR5","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.jpdc.2022.10.002","volume":"172","author":"P Kumar","year":"2023","unstructured":"Kumar, P., Kumar, R., Gupta, G.P., Tripathi, R., Jolfaei, A., Najmul Islam, A.K.M.: A blockchain-orchestrated deep learning approach for secure data transmission in IoT-enabled healthcare system. J. Parallel Distrib. Comput. 172, 69\u201383 (2023). https:\/\/doi.org\/10.1016\/j.jpdc.2022.10.002","journal-title":"J. Parallel Distrib. Comput."},{"key":"4874_CR6","doi-asserted-by":"publisher","first-page":"100591","DOI":"10.1016\/j.measen.2022.100591","volume":"25","author":"I Singh","year":"2023","unstructured":"Singh, I., Singh, B.: Access management of IoT devices using access control mechanism and decentralized authentication: a review. Measurement Sens. 25, 100591 (2023). https:\/\/doi.org\/10.1016\/j.measen.2022.100591","journal-title":"Measurement Sens."},{"key":"4874_CR7","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.aej.2022.09.031","volume":"65","author":"AI Taloba","year":"2023","unstructured":"Taloba, A.I., Elhadad, A., Rayan, A., Abd El-Aziz, R.M., Salem, M., Alzahrani, A.A., Alharithi, F.S., Park, C.: A blockchain-based hybrid platform for multimedia data processing in IoT-Healthcare. Alex. Eng. J. 65, 263\u2013274 (2023)","journal-title":"Alex. Eng. J."},{"key":"4874_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.10.004","author":"D Mishra","year":"2022","unstructured":"Mishra, D., Naik, B., Nayak, J., Souri, A., Dash, P.B., Vimal, S.: Light gradient boosting machine with optimized hyperparameters for identification of malicious access in IoT network. Digit. Commun. Netw. (2022). https:\/\/doi.org\/10.1016\/j.dcan.2022.10.004","journal-title":"Digit. Commun. Netw."},{"key":"4874_CR9","doi-asserted-by":"publisher","first-page":"111147","DOI":"10.1016\/j.automatica.2023.111147","volume":"155","author":"A Naha","year":"2022","unstructured":"Naha, A., Teixeira, A., Ahl\u00e9n, A., Dey, S.: Quickest detection of deception attacks on cyber-physical systems with a parsimonious watermarking policy. Automatica 155, 111147 (2022). https:\/\/doi.org\/10.1016\/j.automatica.2023.111147","journal-title":"Automatica"},{"key":"4874_CR10","doi-asserted-by":"publisher","first-page":"1752","DOI":"10.1016\/j.procs.2023.01.153","volume":"218","author":"R Golchha","year":"2023","unstructured":"Golchha, R., Joshi, A., Gupta, G.P.: Voting-based ensemble learning approach for cyber attacks detection in industrial internet of things. Procedia Comput. Sci. 218, 1752\u20131759 (2023). https:\/\/doi.org\/10.1016\/j.procs.2023.01.153","journal-title":"Procedia Comput. Sci."},{"key":"4874_CR11","doi-asserted-by":"publisher","first-page":"111223","DOI":"10.1109\/ACCESS.2020.2999468","volume":"8","author":"EM Abou-Nassar","year":"2020","unstructured":"Abou-Nassar, E.M., Iliyasu, A.M., El-Kafrawy, P.M., Song, O.Y., Bashir, A.K., El-Latif, A.A.A.: DITrust chain: towards blockchain-based trust models for sustainable healthcare IoT systems. IEEE Access 8, 111223\u2013111238 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2999468","journal-title":"IEEE Access"},{"key":"4874_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.12.013","author":"M Abdel-Basset","year":"2022","unstructured":"Abdel-Basset, M., Hawash, H., Moustafa, N., Razzak, I., Abd Elfattah, M.: Privacy-preserved learning from non-IID data in fog-assisted IoT: a federated learning approach. Digit. Commun. Netw. (2022). https:\/\/doi.org\/10.1016\/j.dcan.2022.12.013","journal-title":"Digit. Commun. Netw."},{"issue":"January","key":"4874_CR13","doi-asserted-by":"publisher","first-page":"100139","DOI":"10.1016\/j.array.2022.100139","volume":"14","author":"EM Adere","year":"2022","unstructured":"Adere, E.M.: Blockchain in healthcare and IoT: a systematic literature review. Array 14(January), 100139 (2022). https:\/\/doi.org\/10.1016\/j.array.2022.100139","journal-title":"Array"},{"issue":"13","key":"4874_CR14","doi-asserted-by":"publisher","first-page":"10318","DOI":"10.1109\/JIOT.2021.3052067","volume":"8","author":"I Ahmed","year":"2021","unstructured":"Ahmed, I., Jeon, G., Piccialli, F.: A deep-learning-based smart healthcare system for patient\u2019s discomfort detection at the edge of internet of things. IEEE Internet Things J. 8(13), 10318\u201310326 (2021). https:\/\/doi.org\/10.1109\/JIOT.2021.3052067","journal-title":"IEEE Internet Things J."},{"key":"4874_CR15","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare11030384","author":"A Alzahrani","year":"2023","unstructured":"Alzahrani, A., Alshehri, M., AlGhamdi, R., Sharma, S.K.: Improved wireless medical cyber-physical system (IWMCPS) based on machine learning. Healthcare (Switzerland) (2023). https:\/\/doi.org\/10.3390\/healthcare11030384","journal-title":"Healthcare (Switzerland)"},{"issue":"9","key":"4874_CR16","doi-asserted-by":"publisher","first-page":"6092","DOI":"10.1109\/TII.2020.2974555","volume":"16","author":"PCM Arachchige","year":"2020","unstructured":"Arachchige, P.C.M., Bertok, P., Khalil, I., Liu, D., Camtepe, S., Atiquzzaman, M.: A trustworthy privacy preserving framework for machine learning in industrial IoT systems. IEEE Trans. Industr. Inf. 16(9), 6092\u20136102 (2020). https:\/\/doi.org\/10.1109\/TII.2020.2974555","journal-title":"IEEE Trans. Industr. Inf."},{"key":"4874_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103341","author":"F Aloraini","year":"2022","unstructured":"Aloraini, F., Javed, A., Rana, O., Burnap, P.: Adversarial machine learning in IoT from an insider point of view. J. Inform. Secur. Appl. (2022). https:\/\/doi.org\/10.1016\/j.jisa.2022.103341","journal-title":"J. Inform. Secur. Appl."},{"issue":"4 April","key":"4874_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0283725","volume":"18","author":"P Aravamudhan","year":"2023","unstructured":"Aravamudhan, P., Kanimozhi, T.: A novel adaptive network intrusion detection system for internet of things. PLoS ONE 18(4 April), 1\u201329 (2023). https:\/\/doi.org\/10.1371\/journal.pone.0283725","journal-title":"PLoS ONE"},{"issue":"3","key":"4874_CR19","doi-asserted-by":"publisher","first-page":"4049","DOI":"10.1109\/JIOT.2018.2876088","volume":"6","author":"M Asif-Ur-Rahman","year":"2019","unstructured":"Asif-Ur-Rahman, M., Afsana, F., Mahmud, M., Shamim Kaiser, M., Ahmed, M.R., Kaiwartya, O., James-Taylor, A.: Toward a heterogeneous mist, fog, and cloud-based framework for the internet of healthcare things. IEEE Internet Things J. 6(3), 4049\u20134062 (2019). https:\/\/doi.org\/10.1109\/JIOT.2018.2876088","journal-title":"IEEE Internet Things J."},{"key":"4874_CR20","doi-asserted-by":"publisher","unstructured":"Binu, P. K., Mohan, D., Sreerag Haridas, E. M.: An SDN-based prototype for dynamic detection and mitigation of DoS attacks in IoT. Proceedings of the 3rd International Conference on Inventive Research in Computing Applications, pp. 1005\u20131010 (2021). https:\/\/doi.org\/10.1109\/ICIRCA51532.2021.9544755","DOI":"10.1109\/ICIRCA51532.2021.9544755"},{"issue":"March","key":"4874_CR21","doi-asserted-by":"publisher","first-page":"100550","DOI":"10.1016\/j.imu.2021.100550","volume":"23","author":"H Bolhasani","year":"2021","unstructured":"Bolhasani, H., Mohseni, M., Rahmani, A.M.: Deep learning applications for IoT in health care: a systematic review. Inform. Med. Unlocked 23(March), 100550 (2021). https:\/\/doi.org\/10.1016\/j.imu.2021.100550","journal-title":"Inform. Med. Unlocked"},{"issue":"19","key":"4874_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/su141912828","volume":"14","author":"R Chaganti","year":"2022","unstructured":"Chaganti, R., Mourade, A., Ravi, V., Vemprala, N., Dua, A., Bhushan, B.: A particle swarm optimization and deep learning approach for intrusion detection system in internet of medical things. Sustainability (Switzerland) 14(19), 1\u201318 (2022). https:\/\/doi.org\/10.3390\/su141912828","journal-title":"Sustainability (Switzerland)"},{"key":"4874_CR23","doi-asserted-by":"publisher","unstructured":"Bakhtiar, F. A., Pramukantoro, E. S., Nihri, H.: A lightweight IDS based on j48 algorithm for detecting DoS attacks on IoT middleware. 2019 IEEE 1st Global Conference on Life Sciences and Technologies, LifeTech, 41\u201342 (2019). https:\/\/doi.org\/10.1109\/LifeTech.2019.8884057","DOI":"10.1109\/LifeTech.2019.8884057"},{"key":"4874_CR24","doi-asserted-by":"publisher","first-page":"12564","DOI":"10.1109\/ACCESS.2022.3143210","volume":"10","author":"KK Coelho","year":"2022","unstructured":"Coelho, K.K., Nogueira, M., Marim, M.C., Silva, E.F., Vieira, A.B., Nacif, J.A.M.: LORENA: low memory symmetric-key generation method for based on group cryptography protocol applied to the internet of healthcare things. IEEE Access 10, 12564\u201312579 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3143210","journal-title":"IEEE Access"},{"key":"4874_CR25","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/9173291","author":"N Dat-Thinh","year":"2022","unstructured":"Dat-Thinh, N., Xuan-Ninh, H., Kim-Hung, L.: MidSiot: a multistage intrusion detection system for internet of things. Wireless Commun. Mobile Comput. (2022). https:\/\/doi.org\/10.1155\/2022\/9173291","journal-title":"Wireless Commun. Mobile Comput."},{"issue":"Idc","key":"4874_CR26","doi-asserted-by":"publisher","first-page":"8418","DOI":"10.1109\/ACCESS.2016.2631546","volume":"4","author":"AM Elmisery","year":"2016","unstructured":"Elmisery, A.M., Rho, S., Botvich, D.: A fog based middleware for automated compliance with OECD privacy principles in internet of healthcare things. IEEE Access 4(Idc), 8418\u20138441 (2016). https:\/\/doi.org\/10.1109\/ACCESS.2016.2631546","journal-title":"IEEE Access"},{"issue":"June","key":"4874_CR27","doi-asserted-by":"publisher","first-page":"100547","DOI":"10.1016\/j.iot.2022.100547","volume":"19","author":"F Fam\u00e1","year":"2022","unstructured":"Fam\u00e1, F., Faria, J.N., Portugal, D.: An IoT-based interoperable architecture for wireless biomonitoring of patients with sensor patches. Internet Things (Netherlands) 19(June), 100547 (2022). https:\/\/doi.org\/10.1016\/j.iot.2022.100547","journal-title":"Internet Things (Netherlands)"},{"issue":"10","key":"4874_CR28","doi-asserted-by":"publisher","first-page":"8395","DOI":"10.1109\/JIOT.2022.3230694","volume":"10","author":"M Fouda","year":"2023","unstructured":"Fouda, M., Ksantini, R., Elmedany, W.: A novel intrusion detection system for internet of healthcare things based on deep subclasses dispersion information. IEEE Internet Things J. 10(10), 8395\u20138407 (2023). https:\/\/doi.org\/10.1109\/JIOT.2022.3230694","journal-title":"IEEE Internet Things J."},{"key":"4874_CR29","doi-asserted-by":"publisher","DOI":"10.1155\/2023\/3939895","author":"T Gaber","year":"2023","unstructured":"Gaber, T., Awotunde, J.B., Folorunso, S.O., Ajagbe, S.A., Eldesouky, E.: Industrial internet of things intrusion detection method using machine learning and optimization techniques. Wireless Commun. Mobile Comput. (2023). https:\/\/doi.org\/10.1155\/2023\/3939895","journal-title":"Wireless Commun. Mobile Comput."},{"key":"4874_CR30","doi-asserted-by":"crossref","unstructured":"Ghourabi A.: A security model based on lightgbm and transformer to protect healthcare systems from cyberattacks. IEEE Access. 10, 48890\u2013903 (2022)","DOI":"10.1109\/ACCESS.2022.3172432"},{"key":"4874_CR31","doi-asserted-by":"crossref","unstructured":"Gope P, Millwood O, Sikdar B.: A scalable protocol level approach to prevent machine learning attacks on physically unclonable function based authentication mechanisms for Internet of Medical Things. IEEE Trans. Ind. Inform. 18(3), 1971\u201380 (2021)","DOI":"10.1109\/TII.2021.3096048"},{"key":"4874_CR32","doi-asserted-by":"publisher","first-page":"101012","DOI":"10.1016\/j.iot.2023.101012","volume":"25","author":"K Aygul","year":"2024","unstructured":"Aygul, K., Mohammadpourfard, M., Kesici, M., Kucuktezcan, F., Genc, I.: Benchmark of machine learning algorithms on transient stability prediction in renewable rich power grids under cyber-attacks. Internet Things 25, 101012 (2024)","journal-title":"Internet Things"},{"key":"4874_CR33","doi-asserted-by":"crossref","unstructured":"Zivkovic, M., Jovanovic, L., Bacanin, N., Petrovic, A., Savanovic, N., & Dobrojevic, M.: XGBoost Tuned by Hybridized SCA Metaheuristics for Intrusion Detection in Healthcare 4.0 IoT Systems. In International Conference on Engineering, Applied Sciences and System Modeling, pp. 1\u201316. Springer, Singapore (2017)","DOI":"10.1007\/978-981-99-8438-1_1"},{"key":"4874_CR34","doi-asserted-by":"publisher","first-page":"172195","DOI":"10.1016\/j.scitotenv.2024.172195","volume":"929","author":"N Bacanin","year":"2024","unstructured":"Bacanin, N., Perisic, M., Jovanovic, G., Dama\u0161evi\u010dius, R., Stanisic, S., Simic, V., Zivkovic, M., Stojic, A.: The explainable potential of coupling hybridized metaheuristics, XGBoost, and SHAP in revealing toluene behavior in the atmosphere. Sci. Total. Environ. 929, 172195 (2024)","journal-title":"Sci. Total. Environ."},{"key":"4874_CR35","doi-asserted-by":"publisher","first-page":"120596","DOI":"10.1016\/j.eswa.2023.120596","volume":"232","author":"G Mohiuddin","year":"2023","unstructured":"Mohiuddin, G., Lin, Z., Zheng, J., Wu, J., Li, W., Fang, Y., Wang, S., Chen, J., Zeng, X.: Intrusion detection using hybridized meta-heuristic techniques with Weighted XGBoost classifier. Expert Syst. Appl. 232, 120596 (2023)","journal-title":"Expert Syst. Appl."},{"issue":"23","key":"4874_CR36","doi-asserted-by":"publisher","first-page":"12687","DOI":"10.3390\/app132312687","volume":"13","author":"M Salb","year":"2023","unstructured":"Salb, M., Jovanovic, L., Bacanin, N., Antonijevic, M., Zivkovic, M., Budimirovic, N., Abualigah, L.: Enhancing internet of things network security using hybrid CNN and xgboost model tuned via modified reptile search algorithm. Appl. Sci. 13(23), 12687 (2023)","journal-title":"Appl. Sci."},{"issue":"10","key":"4874_CR37","doi-asserted-by":"publisher","first-page":"102982","DOI":"10.1016\/j.asej.2024.102982","volume":"15","author":"MA Al-qaness","year":"2024","unstructured":"Al-qaness, M.A., Abd Elaziz, M., Dahou, A., Ewees, A.A., Al-Betar, M.A., Shrahili, M., Ibrahim, R.A.: Optimized quantum LSTM using modified electric Eel foraging optimization for real-world intelligence engineering systems. Ain Shams Eng. J. 15(10), 102982 (2024)","journal-title":"Ain Shams Eng. J."},{"issue":"9","key":"4874_CR38","doi-asserted-by":"publisher","first-page":"4430","DOI":"10.3390\/s23094430","volume":"23","author":"A Fatani","year":"2023","unstructured":"Fatani, A., Dahou, A., Abd Elaziz, M., Al-Qaness, M.A., Lu, S., Alfadhli, S.A., Alresheedi, S.S.: Enhancing intrusion detection systems for IoT and cloud environments using a growth optimizer algorithm and conventional neural networks. Sensors 23(9), 4430 (2023)","journal-title":"Sensors"},{"issue":"21","key":"4874_CR39","doi-asserted-by":"publisher","first-page":"2705","DOI":"10.3390\/math9212705","volume":"9","author":"N Bacanin","year":"2021","unstructured":"Bacanin, N., Stoean, R., Zivkovic, M., Petrovic, A., Rashid, T.A., Bezdan, T.: Performance of a novel chaotic firefly algorithm with enhanced exploration for tackling global optimization problems: application for dropout regularization. Mathematics 9(21), 2705 (2021)","journal-title":"Mathematics"},{"key":"4874_CR40","doi-asserted-by":"publisher","first-page":"2533","DOI":"10.1007\/s00521-018-3937-8","volume":"32","author":"S Malakar","year":"2020","unstructured":"Malakar, S., Ghosh, M., Bhowmik, S., Sarkar, R., Nasipuri, M.: A GA based hierarchical feature selection approach for handwritten word recognition. Neural Comput. Appl. 32, 2533\u20132552 (2020)","journal-title":"Neural Comput. Appl."},{"key":"4874_CR41","doi-asserted-by":"crossref","unstructured":"Zivkovic M, Bacanin N, Tuba E, Strumberger I, Bezdan T, Tuba M.: Wireless sensor networks life time optimization based on the improved firefly algorithm. In 2020 International Wireless Communications and Mobile Computing (IWCMC), pp. 1176\u20131181. IEEE (2020)","DOI":"10.1109\/IWCMC48107.2020.9148087"},{"key":"4874_CR42","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1405","volume":"9","author":"M Dobrojevic","year":"2023","unstructured":"Dobrojevic, M., Zivkovic, M., Chhabra, A., Sani, N.S., Bacanin, N., Amin, M.M.: Addressing internet of things security by enhanced sine cosine metaheuristics tuned hybrid machine learning model and results interpretation based on shap approach. PeerJ Comput. Sci. 9, e1405 (2023)","journal-title":"PeerJ Comput. Sci."},{"key":"4874_CR43","doi-asserted-by":"crossref","unstructured":"Jovanovic, L., Gajevic, M., Dobrojevic, M., Budimirovic, N., Bacanin, N., & Zivkovic, M.: Tackling iot security challenge by metaheuristics tuned extreme learning machine. In International conference on intelligent sustainable systems, pp. 507\u2013522. Springer, Singapore (2023)","DOI":"10.1007\/978-981-99-1726-6_39"},{"key":"4874_CR44","doi-asserted-by":"crossref","unstructured":"Du XX, Mu Y, Ye ZW, Zhu YJ.: A passive target recognition method based on LED lighting for industrial internet of things. IEEE Photonics J. 13(4), 1-8 (2021)","DOI":"10.1109\/JPHOT.2021.3098672"},{"issue":"1","key":"4874_CR45","doi-asserted-by":"publisher","first-page":"312","DOI":"10.30574\/msarr.2024.10.1.0037","volume":"10","author":"OA Ajala","year":"2024","unstructured":"Ajala, O.A., Okoye, C.C., Ofodile, O.C., Arinze, C.A., Daraojimba, O.D.: Review of AI and machine learning applications to predict and Thwart cyber-attacks in real-time. Magna Sci. Adv. Res. Rev. 10(1), 312\u2013320 (2024)","journal-title":"Magna Sci. Adv. Res. Rev."},{"key":"4874_CR46","doi-asserted-by":"publisher","first-page":"110955","DOI":"10.1016\/j.asoc.2023.110955","volume":"149","author":"M Todorovic","year":"2023","unstructured":"Todorovic, M., Stanisic, N., Zivkovic, M., Bacanin, N., Simic, V., Tirkolaee, E.B.: Improving audit opinion prediction accuracy using metaheuristics-tuned XGBoost algorithm with interpretable results through SHAP value analysis. Appl. Soft Comput. 149, 110955 (2023)","journal-title":"Appl. Soft Comput."},{"key":"4874_CR47","doi-asserted-by":"publisher","first-page":"e956","DOI":"10.7717\/peerj-cs.956","volume":"8","author":"M Zivkovic","year":"2022","unstructured":"Zivkovic, M., Tair, M., Venkatachalam, K., Bacanin, N., Hub\u00e1lovsk\u00fd, \u0160, Trojovsk\u00fd, P.: Novel hybrid firefly algorithm: An application to enhance XGBoost tuning for intrusion detection classification. PeerJ Comput. Sci. 8, e956 (2022)","journal-title":"PeerJ Comput. Sci."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04874-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04874-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04874-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T07:06:55Z","timestamp":1757142415000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04874-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,25]]},"references-count":47,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["4874"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04874-w","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,25]]},"assertion":[{"value":"30 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 October 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 October 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"230"}}